The words "forensic analysis" conjure up images of Sherlock Holmes, or scientists adorned with lab coast, hunched over corpses. But in this article I will lead you through steps that you can take to analyze compromised computer systems. While forensics carries with it legal connotations, requirements for evidence collection, and analysis at a level unattainable by most system administrators, my focus is on what you can do without years of experience. In this article we will walk through a pair of real, recent intrusions to help non-professional analyst understand how to accomplish common forensic goals.
© 2001-2024 Fundación Dialnet · Todos los derechos reservados